Gone Phishing

Don’t Take the Bait Phishing attacks are fraudulent email messages appearing to come from a legitimate source (e.g., your supervisor, HR, or your bank). These messages include links pointed to fake websites, or allow malicious programs to run in the background of your computer, in an attempt to collect private information.   It is impossible[…]

Don’t Forget to Secure Your Mobile Devices

Smartphones and tablet computers are convenient tools to mobile workers, but they introduce a ton of security risks. Here are some do’s and don’ts to ensure you stay safe as possible while using these devices:   DO configure your devices securely. That means enabling auto-lock with an unlock password, creating a strong complex password, disabling[…]

First Aid Essentials for Car or Purse

Tweezers Tweezers are an essential part of any first aid kit, particularly if you enjoy hiking or other outdoor activities. The safest way to remove a splinter or a tick is with a clean pair of tweezers. Disinfect the tweezers with alcohol well before and after each use.   Hydrocortisone Cream For itchy bites, consider[…]

Types of Internet Abuse Used to Cyberbully

You might look at the internet in private, but anything you share can quickly become very public. Knowing these five types of internet abuse—which have been used by cyberbullies to embarrass, exploit and harass others—as well as strategies for protecting yourself against them, can help you avoid running into problems.   Social Exclusion Social exclusion might[…]